An Encryption Traffic Analysis Countermeasure Model Based on Game Theory
暂无分享,去创建一个
[1] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[2] T. Basar,et al. A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[3] Lawrence Carin,et al. Cybersecurity Strategies: The QuERIES Methodology , 2008, Computer.
[4] Peng Liu,et al. Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2005, ACM Trans. Inf. Syst. Secur..
[5] Chuanyi Ji,et al. Modeling and defending against internet worm attacks , 2007 .
[6] Zhouguo Chen,et al. The Random Forest Based Detection of Shadowsock's Traffic , 2017, 2017 9th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC).
[7] Jean Goubault-Larrecq,et al. A Logical Framework for Evaluating Network Resilience Against Faults and Attacks , 2007, ASIAN.
[8] Andrew M. White. Practical analysis of encrypted network traffic , 2015 .
[9] Blake Anderson,et al. Identifying Encrypted Malware Traffic with Contextual Flow Data , 2016, AISec@CCS.
[10] Blake Anderson,et al. Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity , 2017, KDD.
[11] T. Basar,et al. Intrusion Response as a Resource Allocation Problem , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.
[12] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[13] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[14] Dong Zhou,et al. Translation techniques in cross-language information retrieval , 2012, CSUR.
[15] Jun Xu,et al. Sustaining Availability of Web Services under Distributed Denial of Service Attacks , 2003, IEEE Trans. Computers.
[16] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[17] Roger B. Myerson,et al. Game theory - Analysis of Conflict , 1991 .
[18] Philip Mirowski. What Were von Neumann and Morgenstern Trying to Accomplish , 1992 .
[19] Mahdi Jafari Siavoshani,et al. Deep packet: a novel approach for encrypted traffic classification using deep learning , 2017, Soft Computing.
[20] Eugene Spafford. CERIAS Tech Report 2005-137 Report to the President on Cyber Security: A Crisis of Prioritization , 2005 .